Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2007-0957


Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.


Published

2007-04-06T01:19:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit kerberos_5 < 1.6.1 Yes
Operating System debian debian_linux 3.1 Yes
Operating System debian debian_linux 4.0 Yes
Operating System canonical ubuntu_linux 5.10 Yes
Operating System canonical ubuntu_linux 6.06 Yes
Operating System canonical ubuntu_linux 6.10 Yes

References